100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Lecture notes

Notes Lectures & Readings Cyber Threats, Security Studies Year 2

Rating
-
Sold
-
Pages
138
Uploaded on
06-06-2025
Written in
2023/2024

This document is a summary of all the notes from lectures and readings for the subject cyber threats, given in security studies year 2.

Institution
Module











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Module

Document information

Uploaded on
June 6, 2025
Number of pages
138
Written in
2023/2024
Type
Lecture notes
Professor(s)
.
Contains
All classes

Subjects

Content preview

Lecture 1
1.​ Millenium bug → coding error
-​ years only in two numbers
2.​ Cambridge analytica → profiling
-​ personalizing advertisements
3.​ OPCW → hack attempt
-​ russia accused of cyber-attack on chemical weapons watchdog
4.​ Diginotar → trust issue
-​ .
5.​ Maastricht University → ransomware attack
-​ .
6.​ Grindr → selling data
7.​ Stuxnet → sabotage
8.​

Cyber (in)security) as a threat to
-​ individuals
-​ groups/organizations
-​ nations
-​ international community

What is cyberspace?
→ composed of all the computerized networks in the world, as well as of all computerized
end points, including telecommunications networks, special purpose networks, the internet,
computer systems, and computer-based systems. The concept also includes the information
stored, processed, and transmitted on the devices and between these networks

What is cybersecurity?
→ comprises technologies, processes and controls that are designed to protect systems,
networks and data from cyber attacks
→ effective cyber security reduces the risk of cyber attacks, and protects organizations and
individuals from the unauthorized exploitation of systems,
networks and technologies

‘if it works, nothing happens’
-​ Is there a threat or are actors not interested?
-​ how can we tell?
-​ focus on measurable outcomes

Why do we care?
-​ protection of critical national infrastructure
-​ privacy and sensitive data
-​ financial reasons

Three-layer model
……

,Protection of Data: CIA-triad
-​ confidentiality
-​ integrity
-​ availability

Confidentiality
→ information only available to authorised entities
→ not only through hacking
→ also:
-​ wrong attachment in an email
-​ data screens in public displays
-​ materials not removed correctly (e.g. secure bins)

Integrity
→ can we trust the data, the whole data and nothing but the data?
→ no changes made to data without detection
-​ changing data
-​ adding data
-​ deleting data

Availability
→ data is available when needed
→ systems up and running
→ people who should have access, do have access

So what about the following?
1.​ Maastricht University (ransomware attack)
2.​ Grindr HIV (data sale)
3.​ Millennium bug (coding error)
4.​ Strava (publishing data)

Data backup
-​ what would you lose if your computer crashed?/ what if your laptop got stolen?/
house burns down

→ 3-2-1
-​ 3 copies
-​ 2 local
-​ 1 far away
→ dropbox etc., usb

Multi-factor authentication (usually 2)
→ something you:
-​ know (password)
-​ have (token, bank card)
-​ are (fingerprint, iris, facial)

,Upside: increased security
Downside: often a (bit more) fuss

VPN → Virtual Private Network
-​ secure connection over unsecure network
-​ When would you want one?
-​ Do you have one?
-​ What are possible dangers?

End-to-end encryption
-​ you already have it
-​ what is it
-​ do we want it

Public-key encryption
→ create pairs of keys: ‘public’ and ‘private’ key
-​ share the public key, keep private key secret
→ used to encrypt/decrypt messages (private key)

Encryption
-​ not just messages, but files as well
-​ helps with the CIA triad!
-​ also helps in starting a cyber attack…
-​ ransomware

, Readings Lecture 1
Meeuwisse
Cybersecurity for beginners

1.​ Cybersecurity & its origins
EMP = electromagnetic pulse
→ organizations collect information to gain power

Cybersecurity = the protection of digital devices and their communication channels to keep
them stable, dependable and reasonably safe from danger or threat. Usually the required
protection level must be sufficient to prevent or address unauthorized access or intervention
before it can lead to substantial personal, professional, organizational, financial and/or
political harm.

Digital device = any electronic appliance that can create, modify, archive, retrieve or transmit
information in an electronic format. Desktop computers, laptops, tablets, smartphones and
Internet-connected home devices are all examples of digital devices.

Defense in depth = the use of multiple layers of security techniques to help reduce the
chance of a successful attack. The idea is that if one security technique fails or is bypassed,
there are others that should address the attack. The latest (and correct) thinking on defense
in depth is that security techniques must also consider people and operations (for example
processes) factors and not just technology.

Virus = a form of malicious software that spreads by infecting (attaching itself) to other files
and usually seeks opportunities to continue that pattern. Viruses are now less common than
other forms of malware. Viruses were the main type of malware in very early computing. For
that reason, people often refer to something as a virus when it is technically another form of
malware

→ The transformation that gave rise to cybersecurity threats was mostly driven by one key
factor: Internet connection speeds became faster, cheaper and more widely adopted, even in
less economically developed countries.

Darwin effect = Those who adapted to the advantages of connected technologies were (and
are) gaining advantages and thriving. Those organizations that were (and are) not evolving
to use connected technologies are mostly shrinking or perishing.

Cryptanalysis = the art of examining ciphered information to determine how to circumvent
the technique that was used to encode or hide it. Analyzing ciphers.

The cloud = An umbrella term used to identify any technology service that uses software and
equipment not physically managed or developed by the person or organization (customer)
using it. This usually provides advantages of on-demand scalability at lower cost. Examples

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
jhbos Leiden University College The Hague
Follow You need to be logged in order to follow users or courses
Sold
19
Member since
5 year
Number of followers
10
Documents
24
Last sold
2 months ago
Van Alles En Nog Wat

NL: hier vind je samenvattingen, opdracthen en meer! EN: this account sells summaries, papers, essays, notes and more!

3.5

2 reviews

5
0
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions